2022
DOI: 10.1007/s11042-022-12691-9
|View full text |Cite
|
Sign up to set email alerts
|

High payload image steganography scheme with minimum distortion based on distinction grade value method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…A suitable length or fragment of the text stream makes the system more reliable and robust. Fragment methods are detailed in [23]. The main goal of the Huffman coding algorithm is to reduce the size of the text before embedding it in the image.…”
Section: Huffman Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…A suitable length or fragment of the text stream makes the system more reliable and robust. Fragment methods are detailed in [23]. The main goal of the Huffman coding algorithm is to reduce the size of the text before embedding it in the image.…”
Section: Huffman Codingmentioning
confidence: 99%
“…The main process of the Huffman algorithm depends on reducing frequent letters and giving them priority codes or short paths in a Huffman tree. Taha et al, [23], the authors illustrate strategies for reducing text frequency (redundancy) through Huffman coding.…”
Section: Huffman Codingmentioning
confidence: 99%
“…And in the third stage, they presented an improved hiding method by randomly selecting blocks/pixels and integrating with Distinction grade value and generating an implicit encryption key to increase the imperceptibility of the scheme. 51 Table 1 shows the comparison of privacy protection methods based on technique, method, use of chaotic map, key and their type of application.…”
Section: Related Workmentioning
confidence: 99%
“…In the second step, they used the Fibonacci analysis method to improve the image strength. And in the third stage, they presented an improved hiding method by randomly selecting blocks/pixels and integrating with Distinction grade value and generating an implicit encryption key to increase the imperceptibility of the scheme 51 …”
Section: Related Workmentioning
confidence: 99%
“…Third-party attacking of data is a risk. This circumstance means that attackers can reach the sender's data in many ways leading to the possibility of malicious threats, eavesdropping, and other malicious activities [2]. Three common techniques are used in this field to ensure data security and privacy: steganography, cryptography, and the watermarking technique.…”
Section: Introductionmentioning
confidence: 99%